Nothing Special   »   [go: up one dir, main page]

US8345640B2 - Method and device to use a mobile terminal with a new subscription - Google Patents

Method and device to use a mobile terminal with a new subscription Download PDF

Info

Publication number
US8345640B2
US8345640B2 US12/520,622 US52062207A US8345640B2 US 8345640 B2 US8345640 B2 US 8345640B2 US 52062207 A US52062207 A US 52062207A US 8345640 B2 US8345640 B2 US 8345640B2
Authority
US
United States
Prior art keywords
code
imsi
mobile terminal
dummy
presentation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US12/520,622
Other versions
US20100015949A1 (en
Inventor
Paul Bradley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales DIS France SA
Original Assignee
Gemalto SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemalto SA filed Critical Gemalto SA
Publication of US20100015949A1 publication Critical patent/US20100015949A1/en
Assigned to GEMALTO S.A. reassignment GEMALTO S.A. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BRADLEY, PAUL
Application granted granted Critical
Publication of US8345640B2 publication Critical patent/US8345640B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support

Definitions

  • the invention relates to a method and a device to freely use a mobile terminal, also called handset, when subscribing a new contract with a different operator from the one the mobile terminal is locked with.
  • a mobile terminal also called handset
  • Such a different operator is for example a Mobile Virtual Network Operator (MVNO), allowing at least voice and data exchanges on a telecommunication network.
  • MVNO Mobile Virtual Network Operator
  • the invention relates to a method and a device for allowing the free usage of mobile terminals.
  • a procedure for checking the validity of smart cards in a mobile-radio end device comprising the steps of reading, by a mobile-radio end device, a portion of data stored in an International Mobile Subscriber Identity of a smart card in the mobile-radio end device; Comparing the at least a portion of data with allowed value range stored in the mobile-radio end device; and allowing operation of the mobile-radio end device with the smart card by the mobile-radio end device when the portion of data read from the smart card in said step (a) is within the allowed value range stored in the mobile-radio end device.
  • SIM subscriber identity module
  • USIM universal subscriber identity module
  • the end-user can pay to have their handset unlocked on the black market but this is not always possible and is an extra expense incurred by the end-user.
  • These subscriber identity module settings are usually the following fields: Leading MCC/MNC digits of the IMSI field, or GID1/GID2 values. The more important of these two fields is the MCC/MNC digits but both can possibly play an important role for the subscriber identity module initialization check.
  • MVNO mobile virtual network operators
  • MVNO mobile virtual network operators
  • the invention relates to a method and device to use a locked mobile terminal with a new subscription. This method is based on presentation of several IMSI and detection of an IMSI with valid MCC and/or MNC code replaced by another IMSI so that the end-user can use his new SIM card with the locked mobile terminal.
  • FIG. 1 represents the main steps related to a system implemented in order to achieve an embodiment of the invention
  • FIG. 2 is a flowchart showing a sequence of steps, according to one method in the system in FIG. 1 for allowing the usage of the locked mobile terminal in order for the end-user to use his previously locked mobile terminal with his new subscription.
  • This new subscription could be as an example a MVNO one.
  • the end-user is placing calls using a mobile terminal associated to a subscriber identity module, connected via a mobile radio communication network such as GSM or 3G telecommunication network.
  • a mobile radio communication network such as GSM or 3G telecommunication network.
  • a dedicated SIM application is stored in a memory of the said subscriber identity module, which could be implemented as a personal token like an UICC card as defined in ETSI standards.
  • This dedicated application can be transferred or installed into the mobile terminal memory in another embodiment.
  • Associated data such as the IMSI file can as well be stored into the subscriber identity module's memory or, in another embodiment, into the mobile terminal's memory.
  • the said dedicated SIM application can allow the end-user to use his mobile terminal with a MNVO subscription.
  • the subscriber identity module stores in one of its memories a per-country list of the operators MCC/MNC codes as described into step 1 of FIG. 1 .
  • the subscriber identity module would currently store the following codes, which codes are well known as recited in current standards:
  • the subscriber identity module provides to the mobile terminal the standardized value of the IMSI (International Mobile Subscriber Identity) containing the MCC/MNC from the list integrated 200 .
  • IMSI International Mobile Subscriber Identity
  • the IMSI is a globally-unique code number that identifies a GSM subscriber to the network.
  • the IMSI is linked to the end-user account information with the carrier.
  • the IMSI resides in the subscriber identity module, which can be moved from one GSM phone to another.
  • the dedicated SIM (subscriber identity module) application registers itself to an event at the end of the mobile terminal subscriber identity module initialization procedure.
  • the correct/real IMSI value of the MVNO is then inserted by the dedicated SIM application into the IMSI standardized file and a request is made so that the mobile re-reads the value of the IMSI file and re-attempts network registration 500 .
  • This correct/real IMSI value of the MVNO typically does not include a MCC/MNC code which is accepted by the mobile terminal.
  • the dedicated SIM application remembers which IMSI value from the list was successful and at the next mobile terminal power-on, it presents that IMSI during the initialization procedure. Again, after the SIM-lock check, the dedicated SIM application repeats step 200 and inserts the correct IMSI and re-requests the mobile terminal to re-attempt network authentication procedure.
  • the mobile network 30 owned by an MVNO, sell subscriber identity module card prepaid packs in all of their mobile phone shops. When a user enters the shop, they ask for a subscriber identity module pack. When the user inserts the subscriber identity module 10 into their mobile terminal 20 , the mobile terminal displays “SIM locked” because their mobile terminal is locked to the mobile network operator 30 .
  • the User inserts the new subscriber identity module 10 with the said dedicated SIM application available on it as shown on step 1 .
  • the said dedicated SIM application presents the first “dummy” IMSI with operator 1 MCC/MNC code as disclosed in step 200 .
  • the mobile terminal remains locked and displays “invalid SIM card” 300 .
  • the user powers off the mobile terminal 400 .
  • the user powers on the mobile terminal 100 , so that the said dedicated SIM application presents the second “dummy” IMSI with operator 2 MCC/MNC code 200 .
  • the mobile terminal remains locked and displays “invalid SIM card” 300 .
  • the user powers off the mobile terminal 400 .
  • the user powers on the mobile terminal 100 so that the said dedicated SIM application presents the third “dummy” IMSI with operator 3 MCC/MNC code 200 .
  • the mobile terminal is unlocked and displays the network search screen but cannot gain access to the network as a false IMSI was presented 500 .
  • the said dedicated SIM application then automatically replaces the IMSI with the real 30 MVNO IMSI and requests the mobile terminal to re-read the IMSI value and retry network registration procedure 500 .
  • he said dedicated SIM application memorizes that it was successful with the operator 3 MCC/MNC code and that it should use this code first next time 500 .
  • the user is successfully authenticated on the network 30 using the correct IMSI step 2 .
  • the user can place calls, send SMS and/or use data services, depending of the MVNO subscription he paid for.
  • the operator 3 MCC/MNC code is presented first.
  • the mobile terminal SIM-lock is overcome and then the SIM application automatically replaces the operator 3 IMSI with that of the MVNO IMSI at the end of the initialization procedure.
  • the SIM dedicated application requests that the mobile terminal re-attempts network registration.
  • this value can be stored by the table and switched in the same manner as the IMSI.
  • GID Group Identifier
  • step 1 the mobile phone, following the ETSI standard, displays “SIM card invalid” because it is locked to another telecommunication mobile network.
  • the end-user associates the new MVNO subscriber identity module with the mobile terminal.
  • the dedicated SIM application described above in the new MVNO subscriber identity module presents the first “dummy” IMSI with operator 1 MCC/MNC code.
  • the handset remains locked and displays “invalid SIM card”.
  • the end-user powers off the mobile terminal and then power it on.
  • the dedicated SIM application described above in the SIM presents the N ⁇ 1 “dummy” IMSI with associated MCC/MNC codes.
  • the handset remains locked and displays “invalid SIM card”.
  • the end-user powers off the mobile terminal and then powers it on.
  • the dedicated SIM application presents the last “dummy” IMSI with correct MCC/MNC code.
  • the mobile terminal is unlocked as the dedicated SIM application has successfully by-passed the IMSI check and therefore the handset displays the network search screen but cannot gain access to the network as a false IMSI was presented.
  • the dedicated SIM application automatically replaces the IMSI with the real MVNO IMSI (incorporating the real MCC/MNC) and requests the mobile terminal to re-read the IMSI value and retry network registration procedure.
  • the dedicated SIM application memorizes that it was successful with the last MCC/MNC code and that it should use this code first next time.
  • the user is successfully authenticated on the network 30 or the equivalent national roaming partner network using the correct IMSI.
  • the user can then use his new MVNO subscription and set up calls, send SMS or use data services.
  • the stored MCC/MNC is presented first.
  • the mobile terminal SIM-lock is overcome straight away and then the dedicated SIM application automatically replaces the stored IMSI with that of the MVNO IMSI at the end of the initialization procedure.
  • the dedicated SIM application requests that the mobile terminal re-attempts network registration now that the MCC/MNC check has been by-passed.
  • Another step can be added, allowing the SIM application to remember which dummy IMSI value from the list was successful and at the next power-on, it presents that IMSI during the initialization procedure.
  • the SIM can tell the network authentication is expected to be successful thanks to the updating of the location information file with data indicating, as a function of the considered area, when the authentication has already been successful or not and which adapted dummy IMSI code to be used at first attempt in which area.
  • the SIM application repeats the step above and inserts the correct IMSI and re-requests the mobile terminal to re-attempt network authentication procedure.
  • the dedicated SIM application (not shown) is preferably stored on the subscriber identity module, more specifically in the subscriber identity module memory.
  • this subscriber identity module can also be a piece of software, the dedicated said application being in this case also a piece of software.
  • the dedicated SIM toolkit application is stored in the subscriber identity module memory for implementing the method that is displayed using the MMI (Man Machine Interface) of the mobile station.
  • MMI Man Machine Interface
  • Such an application is also known as an applet, or more specifically a cardlet, when implemented on a JavaTM card type of subscriber identity module.
  • the subscriber identity module processor executes this agent application.
  • SIM toolkit application it is not to be construed to be limited as such.
  • said dedicated SIM application can be developed so that to be executable on the mobile terminal and sent to the mobile terminal memory.
  • the mobile terminal and the subscriber identity module are shown and described to be linked devices, it should not be construed to be limited as such. They can be as example two separate devices communicating using contactless channels such as infrared IrDA or ISO 14443.
  • Another advantage of the present embodiment of the invention is to propose to the end-user a free solution to use mobile he already paid for without needing to pay additional fees.
  • this dedicated value can be stored by the table and switched in the same manner as the IMSI.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to a method and device to use a locked mobile terminal with a new subscription. This method is based on presentation of several IMSI and detection of an IMSI with valid MCC and/or MNC code replaced by another IMSI so that the end-user can use his new SIM card with the locked mobile terminal.

Description

BACKGROUND
1. Field of the Invention
The invention relates to a method and a device to freely use a mobile terminal, also called handset, when subscribing a new contract with a different operator from the one the mobile terminal is locked with. Such a different operator is for example a Mobile Virtual Network Operator (MVNO), allowing at least voice and data exchanges on a telecommunication network. More particularly, the invention relates to a method and a device for allowing the free usage of mobile terminals.
2. Background Art
Currently, mobile terminals are sold with an operator lock, implemented whereby the mobile operator has subsidized the mobile terminal. The telecommunication operators implement a lock mechanism so that only a subscriber identity module containing the IMSI of that operator can be used. It's known as described in the ETSI standard, that the locked mobile terminal checks for a specific Mobile Country Code (MCC)/Mobile Network Code (MNC) within the International Mobile Subscriber Identity (IMSI) during its initialization phase and unless the IMSI matches the predefined IMSI in the mobile terminal, the subscriber identity module is rejected and considered as not valid by the telecommunication network.
Currently, as disclosed in US2001030235, a procedure for checking the validity of smart cards in a mobile-radio end device is known, comprising the steps of reading, by a mobile-radio end device, a portion of data stored in an International Mobile Subscriber Identity of a smart card in the mobile-radio end device; Comparing the at least a portion of data with allowed value range stored in the mobile-radio end device; and allowing operation of the mobile-radio end device with the smart card by the mobile-radio end device when the portion of data read from the smart card in said step (a) is within the allowed value range stored in the mobile-radio end device.
MVNO today sell many (U)SIM-only packs to end-users. That means that the MVNO provide to end-users an UICC implementing subscriber identity module (SIM) or universal subscriber identity module USIM. When end-users insert their MVNO (U)SIM card into their existing handset, they are often disappointed to find that the handset remains locked to their network facilities unless the end-user pays an unlocking fee or the remainder of the monthly fees until the end of the contract.
The end-user can pay to have their handset unlocked on the black market but this is not always possible and is an extra expense incurred by the end-user.
Currently Different Handset locking mechanisms are implemented and mobile telecommunication operators agree upon several different parameters stored on the subscriber identity module, which must be verified by the handset during the initialization sequence.
These subscriber identity module settings are usually the following fields: Leading MCC/MNC digits of the IMSI field, or GID1/GID2 values. The more important of these two fields is the MCC/MNC digits but both can possibly play an important role for the subscriber identity module initialization check.
A small proportion of Mobile network operators today are implementing SIM lock via GID1/GID2 and the principal means of mobile terminal locking is via the IMSI. Consequently, when a mobile virtual network operators (MVNO) provides a subscriber identity module to a new end-user, unless the end-user has an unlocked mobile terminal, he cannot use the mobile virtual network operators (MVNO) subscriber identity module.
Consequently, when a mobile virtual network operators (MVNO) provides a subscriber identity module to a new end-user, unless the end-user has an unlocked mobile terminal, he cannot use the mobile virtual network operators (MVNO) subscriber identity module.
There is consequently a need to provide a way for the end-user to use his mobile terminal when subscribing for a mobile virtual network operators (MVNO) subscription or prepaid contract.
It is in fact desirable to provide an efficient way to allow the mobile phone end-user to benefit from this new MVNO subscription, even if the mobile terminal he has was previously, during the phase the end-user had a contract with another network operator, locked by the said network operator. There are indeed locked mobile terminals MVNO new customers would like to use.
SUMMARY
The invention relates to a method and device to use a locked mobile terminal with a new subscription. This method is based on presentation of several IMSI and detection of an IMSI with valid MCC and/or MNC code replaced by another IMSI so that the end-user can use his new SIM card with the locked mobile terminal.
Other aspects and advantages of the invention will be apparent from the following description and the appended claims.
BRIEF DESCRIPTION OF DRAWINGS
FIG. 1 represents the main steps related to a system implemented in order to achieve an embodiment of the invention, and
FIG. 2 is a flowchart showing a sequence of steps, according to one method in the system in FIG. 1 for allowing the usage of the locked mobile terminal in order for the end-user to use his previously locked mobile terminal with his new subscription. This new subscription could be as an example a MVNO one.
DETAILED DESCRIPTION
Hereafter, an embodiment of the invention will be described wherein the end-user is placing calls using a mobile terminal associated to a subscriber identity module, connected via a mobile radio communication network such as GSM or 3G telecommunication network.
A dedicated SIM application is stored in a memory of the said subscriber identity module, which could be implemented as a personal token like an UICC card as defined in ETSI standards. This dedicated application can be transferred or installed into the mobile terminal memory in another embodiment. Associated data such as the IMSI file can as well be stored into the subscriber identity module's memory or, in another embodiment, into the mobile terminal's memory.
There are several ways by which the said dedicated SIM application can allow the end-user to use his mobile terminal with a MNVO subscription.
According to one aspect of the invention, there is provided a method that is implemented on the said system.
In order to allow SIM lock, as described in the ETSI standard, the subscriber identity module stores in one of its memories a per-country list of the operators MCC/MNC codes as described into step 1 of FIG. 1. For example in the United Kingdom, the subscriber identity module would currently store the following codes, which codes are well known as recited in current standards:
UK Operator 1 234 #1
UK Operator 2 234 #2
UK Operator 3 234 #3
UK Operator 4 234 #4
UK Operator 5 234 #5
At each power-on of the mobile terminal 100, the subscriber identity module provides to the mobile terminal the standardized value of the IMSI (International Mobile Subscriber Identity) containing the MCC/MNC from the list integrated 200.
The IMSI is a globally-unique code number that identifies a GSM subscriber to the network. The IMSI is linked to the end-user account information with the carrier. The IMSI resides in the subscriber identity module, which can be moved from one GSM phone to another.
Once the mobile terminal is successfully powered-on with an IMSI code that successfully passes the SIM-lock check 300, the dedicated SIM (subscriber identity module) application registers itself to an event at the end of the mobile terminal subscriber identity module initialization procedure.
The correct/real IMSI value of the MVNO is then inserted by the dedicated SIM application into the IMSI standardized file and a request is made so that the mobile re-reads the value of the IMSI file and re-attempts network registration 500. This correct/real IMSI value of the MVNO typically does not include a MCC/MNC code which is accepted by the mobile terminal.
In one preferred embodiment the dedicated SIM application remembers which IMSI value from the list was successful and at the next mobile terminal power-on, it presents that IMSI during the initialization procedure. Again, after the SIM-lock check, the dedicated SIM application repeats step 200 and inserts the correct IMSI and re-requests the mobile terminal to re-attempt network authentication procedure.
A detailed implementation can be based on the following embodiment: The mobile network 30, owned by an MVNO, sell subscriber identity module card prepaid packs in all of their mobile phone shops. When a user enters the shop, they ask for a subscriber identity module pack. When the user inserts the subscriber identity module 10 into their mobile terminal 20, the mobile terminal displays “SIM locked” because their mobile terminal is locked to the mobile network operator 30.
Implementing a dedicated SIM application installed into the subscriber identity module 10, the following steps will follow:
The User inserts the new subscriber identity module 10 with the said dedicated SIM application available on it as shown on step 1.
The said dedicated SIM application presents the first “dummy” IMSI with operator 1 MCC/MNC code as disclosed in step 200.
The mobile terminal remains locked and displays “invalid SIM card” 300.
The user powers off the mobile terminal 400.
The user powers on the mobile terminal 100, so that the said dedicated SIM application presents the second “dummy” IMSI with operator 2 MCC/MNC code 200.
The mobile terminal remains locked and displays “invalid SIM card” 300.
The user powers off the mobile terminal 400.
The user powers on the mobile terminal 100 so that the said dedicated SIM application presents the third “dummy” IMSI with operator 3 MCC/MNC code 200.
The mobile terminal is unlocked and displays the network search screen but cannot gain access to the network as a false IMSI was presented 500.
The said dedicated SIM application then automatically replaces the IMSI with the real 30 MVNO IMSI and requests the mobile terminal to re-read the IMSI value and retry network registration procedure 500.
In one preferred embodiment, in order to save time and to optimize the end-user experience, he said dedicated SIM application memorizes that it was successful with the operator 3 MCC/MNC code and that it should use this code first next time 500.
The user is successfully authenticated on the network 30 using the correct IMSI step 2.
The user can place calls, send SMS and/or use data services, depending of the MVNO subscription he paid for.
In the preferred embodiment, at next power-on, the operator 3 MCC/MNC code is presented first. The mobile terminal SIM-lock is overcome and then the SIM application automatically replaces the operator 3 IMSI with that of the MVNO IMSI at the end of the initialization procedure. The SIM dedicated application requests that the mobile terminal re-attempts network registration.
In the case where operators use a Group Identifier (GID) lock then this value can be stored by the table and switched in the same manner as the IMSI.
From an end-user experience point of view, as an example, when the end-user goes online to buy a SIM pack he then receives a subscriber identity module. When the end-user inserts this subscriber identity module into his mobile phone, step 1, the mobile phone, following the ETSI standard, displays “SIM card invalid” because it is locked to another telecommunication mobile network.
If the dedicated SIM application described above is available on the MVNO subscriber identity module, the following will then happen:
The end-user associates the new MVNO subscriber identity module with the mobile terminal.
The dedicated SIM application described above in the new MVNO subscriber identity module presents the first “dummy” IMSI with operator 1 MCC/MNC code.
The handset remains locked and displays “invalid SIM card”. The end-user powers off the mobile terminal and then power it on.
This can happen several times, depending of the number of IMSI stored.
The dedicated SIM application described above in the SIM presents the N−1 “dummy” IMSI with associated MCC/MNC codes.
The handset remains locked and displays “invalid SIM card”. The end-user powers off the mobile terminal and then powers it on.
The dedicated SIM application presents the last “dummy” IMSI with correct MCC/MNC code.
The mobile terminal is unlocked as the dedicated SIM application has successfully by-passed the IMSI check and therefore the handset displays the network search screen but cannot gain access to the network as a false IMSI was presented.
The dedicated SIM application automatically replaces the IMSI with the real MVNO IMSI (incorporating the real MCC/MNC) and requests the mobile terminal to re-read the IMSI value and retry network registration procedure. The dedicated SIM application memorizes that it was successful with the last MCC/MNC code and that it should use this code first next time.
The user is successfully authenticated on the network 30 or the equivalent national roaming partner network using the correct IMSI.
The user can then use his new MVNO subscription and set up calls, send SMS or use data services.
At next power-on, the stored MCC/MNC is presented first. The mobile terminal SIM-lock is overcome straight away and then the dedicated SIM application automatically replaces the stored IMSI with that of the MVNO IMSI at the end of the initialization procedure. The dedicated SIM application requests that the mobile terminal re-attempts network registration now that the MCC/MNC check has been by-passed.
Another step can be added, allowing the SIM application to remember which dummy IMSI value from the list was successful and at the next power-on, it presents that IMSI during the initialization procedure.
The SIM can tell the network authentication is expected to be successful thanks to the updating of the location information file with data indicating, as a function of the considered area, when the authentication has already been successful or not and which adapted dummy IMSI code to be used at first attempt in which area. Again, after the SIM-lock check, the SIM application repeats the step above and inserts the correct IMSI and re-requests the mobile terminal to re-attempt network authentication procedure.
Those skilled in the art should recognize that the method described above is also applicable to other types of communication sessions between two devices operable either on the same network or different networks.
The dedicated SIM application (not shown) is preferably stored on the subscriber identity module, more specifically in the subscriber identity module memory.
According to one embodiment, this subscriber identity module can also be a piece of software, the dedicated said application being in this case also a piece of software.
According to one other embodiment, the dedicated SIM toolkit application is stored in the subscriber identity module memory for implementing the method that is displayed using the MMI (Man Machine Interface) of the mobile station. Such an application is also known as an applet, or more specifically a cardlet, when implemented on a Java™ card type of subscriber identity module.
Hereafter, this application will be referred to as an agent application. The subscriber identity module processor executes this agent application. Advantageously, in a preferred embodiment, everything happens into the subscriber identity module.
Although the invention is described with SIM toolkit application, it is not to be construed to be limited as such. For example, although not ideal, the said dedicated SIM application can be developed so that to be executable on the mobile terminal and sent to the mobile terminal memory.
As another example, although the mobile terminal and the subscriber identity module are shown and described to be linked devices, it should not be construed to be limited as such. They can be as example two separate devices communicating using contactless channels such as infrared IrDA or ISO 14443.
Another advantage of the present embodiment of the invention is to propose to the end-user a free solution to use mobile he already paid for without needing to pay additional fees.
In one embodiment, relating to the case where operators use a Group Identifier (GID) lock, this dedicated value can be stored by the table and switched in the same manner as the IMSI.

Claims (7)

1. A method to use a mobile terminal with a different operator from the one the mobile terminal was previously used with, on a telecommunication network comprising the said mobile terminal and a personal token, said method comprising:
a step of personal token actuation in the mobile terminal; and
a step of presentation of a dummy International Mobile Subscriber Identity (“IMSI”) code from the said personal token to the said mobile terminal, and wherein when there is detection by the mobile terminal of the presentation of the dummy IMSI code with a first code selected from a group consisting of a first Mobile Country Code (“MCC”) and a first Mobile Network Code (“MNC”) code, the step of presentation further comprises:
a step of indicating that the personal token is invalid in response to the step of presenting the dummy IMSI and the first code;
a step of selecting a second code from a group consisting of a second MCC and a second MNC;
a step of presenting the dummy IMSI and the second code to the mobile terminal;
a step of displaying a network search screen on a screen of the mobile terminal in response to the presentation of the dummy IMSI and the second code;
a step of replacing the dummy IMSI code with an IMSI code of a different operator after the step of displaying, and
a step of requesting the mobile terminal to re-read the IMSI code and retry network registration procedure after the step of replacing.
2. The method according to claim 1, wherein the step of replacing the dummy IMSI code with the IMSI code of the different operator is followed by a step of memorizing that the IMSI code of the different operator was successful with the last IMSI code and that the IMSI code of the different operator should use this code as the first presented IMSI code at the next personal token actuation.
3. The method according to claim 1 wherein the step of requesting is preceded by a step of repetition of the presentation of other IMSI codes stored into the personal token.
4. The method according to claim 1, wherein the step of indicating comprises displaying ‘invalid SIM’ on the screen of the mobile terminal.
5. A terminal system comprising:
a mobile terminal; and
a personal token which the terminal system is configured to store and run instructions for allowing the terminal system to use the said mobile terminal with a different operator from the one the mobile terminal was previously used with on a telecommunication network,
wherein said instructions, when executed, induce the terminal system to, when there is detection of a presentation of a dummy IMSI code and a first code selected from a group consisting of first MCC and a first MNC code:
indicate that the personal token is invalid in response to the step of presenting the dummy IMSI and the first code;
select a second code from a group consisting of a second MCC and a second MNC;
present the dummy IMSI and the second code to the mobile terminal;
display a network search screen on a screen of the mobile terminal in response to the presentation of the dummy IMSI and the second code;
replace the dummy IMSI code with an IMSI code of a different operator after the displaying,
request the mobile terminal to re-read the IMSI code and retry network registration procedure after the replacing.
6. The terminal system according to claim 5, wherein a dedicated application is stored in the personal token, wherein when said application is run by the personal token, the application performs:
presentation of the dummy IMSI code to the said mobile terminal,
in case of detection of the presentation of the dummy IMSI code and the second code:
replacing the dummy IMSI code with the IMSI code of the different operator, and
requesting the mobile terminal to re-read the IMSI code and retry network registration procedure after the replacing.
7. A personal token for being associated to a terminal inside a communication network, wherein the personal token is configured to:
store and execute instructions which, when executed, induce the personal token into presenting dummy IMSI code to the said mobile terminal, wherein when there is detection of the presentation of the dummy IMSI and a first code selected from a first MCC and an expected first MNC code:
indicate that the personal token is invalid in response to the step of presenting the dummy IMSI and the first code;
select a second code from a group consisting of a second MCC and a second MNC;
present the dummy IMSI and the second code to the mobile terminal;
display a network search screen on a screen of the mobile terminal in response to the presentation of the dummy IMSI and the second code;
replace the dummy IMSI code with the IMSI code of the different operator, and
replace the mobile terminal to re-read the IMSI code and retry network registration procedure after the replacing.
US12/520,622 2006-12-22 2007-12-21 Method and device to use a mobile terminal with a new subscription Expired - Fee Related US8345640B2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
EP06270109A EP1937015A1 (en) 2006-12-22 2006-12-22 Use of a locked mobile terminal with a new subscription
EP06270109.9 2006-12-22
EP06270109 2006-12-22
PCT/IB2007/004086 WO2008078175A1 (en) 2006-12-22 2007-12-21 Use of a locked mobile terminal with a new subscription

Publications (2)

Publication Number Publication Date
US20100015949A1 US20100015949A1 (en) 2010-01-21
US8345640B2 true US8345640B2 (en) 2013-01-01

Family

ID=38123203

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/520,622 Expired - Fee Related US8345640B2 (en) 2006-12-22 2007-12-21 Method and device to use a mobile terminal with a new subscription

Country Status (3)

Country Link
US (1) US8345640B2 (en)
EP (2) EP1937015A1 (en)
WO (1) WO2008078175A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9603006B2 (en) 2011-09-19 2017-03-21 Truphone Limited Managing mobile device identities
US9712994B2 (en) 2011-06-02 2017-07-18 Truphone Limited Identity management for mobile devices

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8290474B2 (en) * 2008-10-09 2012-10-16 Nokia Corporation Method, apparatus and computer program product for providing smart card security
CN101651942B (en) * 2009-09-04 2012-05-23 中兴通讯股份有限公司 Method and device for unlocking terminal equipment
US8924733B2 (en) * 2010-06-14 2014-12-30 International Business Machines Corporation Enabling access to removable hard disk drives
CN102131184B (en) * 2011-03-11 2014-01-01 惠州Tcl移动通信有限公司 Mobile phone and received message processing method thereof
EP2640158B1 (en) * 2011-07-21 2016-10-12 Spreadtrum Communications (Shanghai) Co., Ltd. Service operator determining method and residing method for multi-card mobile terminal
CN102630081B (en) * 2012-03-22 2015-03-11 华为终端有限公司 Operator configuration information loading method and terminal
CN104159213A (en) * 2013-05-15 2014-11-19 中兴通讯股份有限公司 Network unlocking method of a network locking mobile terminal, and mobile terminal
CN106171019B (en) * 2014-09-18 2019-10-25 华为技术有限公司 Determine the method, apparatus, terminal and server of terminal roaming status
CN105611030A (en) * 2014-11-20 2016-05-25 中兴通讯股份有限公司 Method, device and terminal for card locking
CN105100344A (en) * 2015-07-28 2015-11-25 集怡嘉数码科技(深圳)有限公司 Hot plug processing method for user recognition module card, and mobile terminal
US9813912B2 (en) 2016-03-30 2017-11-07 T-Mobile Usa, Inc. Secure adaptive device locking
US9819374B2 (en) 2016-03-30 2017-11-14 T-Mobile Usa, Inc. Advanced device locking criteria
EP3698300A1 (en) * 2017-10-18 2020-08-26 Telefonaktiebolaget LM Ericsson (PUBL) Method and system for cellular-based shipment tracking
US10939297B1 (en) * 2018-09-27 2021-03-02 T-Mobile Innovations Llc Secure unlock of mobile phone
US10893411B2 (en) * 2019-05-02 2021-01-12 T-Mobile Usa, Inc. Systems and methods for reactive remote SIM unlocking

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998010614A1 (en) 1996-09-04 1998-03-12 Swisscom Ag Roaming process and pertaining devices
US20010030235A1 (en) 2000-04-12 2001-10-18 Atecs Mannesmann Ag Procedure for blocking certain international mobile subscriber identity ranges of prepaid and postpaid smart cards
WO2002021872A1 (en) 2000-09-08 2002-03-14 Transatel Method and device for connecting a terminal to several telecommunication networks
EP1239687A1 (en) 2001-03-10 2002-09-11 Drive-It Systems Ab Communication with a plurality of public land mobile communication networks (PLMNs) without roaming agreements
US20040087305A1 (en) * 2002-08-05 2004-05-06 Jiang Yue Jun John Method and system for cellular network traffic redirection
WO2004060005A1 (en) 2002-12-05 2004-07-15 Vodafone Holding Gmbh Sim card with memorization of the home network identification
FR2856878A1 (en) 2003-06-26 2004-12-31 Labordere Arnaud Henry Information transmitting system for mobile telephone, has intermediate operator linked to network operators by data exchange link permitting intermediate operator to receive signaling message from one network operator
US20050070278A1 (en) * 2003-08-13 2005-03-31 Jiang Yue Jun Signaling gateway with multiple IMSI with multiple MSISDN (MIMM) service in a single SIM for multiple roaming partners
US20080113687A1 (en) * 2006-11-10 2008-05-15 Prendergast Liam N Methods and systems for managing and/or tracking use of subscriber identity module components
US20080242267A1 (en) * 2005-11-07 2008-10-02 Axalto Sa Remote Activation of a User Account in a Telecommunication Network

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998010614A1 (en) 1996-09-04 1998-03-12 Swisscom Ag Roaming process and pertaining devices
US20010030235A1 (en) 2000-04-12 2001-10-18 Atecs Mannesmann Ag Procedure for blocking certain international mobile subscriber identity ranges of prepaid and postpaid smart cards
WO2002021872A1 (en) 2000-09-08 2002-03-14 Transatel Method and device for connecting a terminal to several telecommunication networks
EP1239687A1 (en) 2001-03-10 2002-09-11 Drive-It Systems Ab Communication with a plurality of public land mobile communication networks (PLMNs) without roaming agreements
US20040087305A1 (en) * 2002-08-05 2004-05-06 Jiang Yue Jun John Method and system for cellular network traffic redirection
WO2004060005A1 (en) 2002-12-05 2004-07-15 Vodafone Holding Gmbh Sim card with memorization of the home network identification
FR2856878A1 (en) 2003-06-26 2004-12-31 Labordere Arnaud Henry Information transmitting system for mobile telephone, has intermediate operator linked to network operators by data exchange link permitting intermediate operator to receive signaling message from one network operator
US20050070278A1 (en) * 2003-08-13 2005-03-31 Jiang Yue Jun Signaling gateway with multiple IMSI with multiple MSISDN (MIMM) service in a single SIM for multiple roaming partners
US20080242267A1 (en) * 2005-11-07 2008-10-02 Axalto Sa Remote Activation of a User Account in a Telecommunication Network
US20080113687A1 (en) * 2006-11-10 2008-05-15 Prendergast Liam N Methods and systems for managing and/or tracking use of subscriber identity module components

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
International Search Report issued in PCT/IB2007/004086, mailed on Jun. 2, 2008, 4 pages.

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9712994B2 (en) 2011-06-02 2017-07-18 Truphone Limited Identity management for mobile devices
US9603006B2 (en) 2011-09-19 2017-03-21 Truphone Limited Managing mobile device identities

Also Published As

Publication number Publication date
US20100015949A1 (en) 2010-01-21
EP1937015A1 (en) 2008-06-25
EP2098092A1 (en) 2009-09-09
WO2008078175A1 (en) 2008-07-03

Similar Documents

Publication Publication Date Title
US8345640B2 (en) Method and device to use a mobile terminal with a new subscription
CN110622535B (en) Method for establishing a bidirectional communication channel between a server and a secure element, corresponding server and secure element
US8761832B2 (en) Method and apparatus for controlling the UICC application file
US9247415B2 (en) Global platform for managing subscriber identity modules
CN101953192B (en) Method and apparatus for managing subscription credentials in a wireless communication device
US20080242267A1 (en) Remote Activation of a User Account in a Telecommunication Network
EP2708069B1 (en) Sim lock for multi-sim environment
US8190198B1 (en) Enabling portability of credentials across dual mode devices
US20120302224A1 (en) Mobile network operator identification
US20160321642A1 (en) Mobile device roaming status subscription
US20070197216A1 (en) Method for locking terminal home
US20090203371A1 (en) Device, system and method for selecting number and opening account for prepaid subscriber
US20080016557A1 (en) Mobile communication terminal and method for authenticating data registration
US20120115443A1 (en) Method for calculating a first identifier of a secure element of a mobile terminal according to a second identifier of said secure element
KR101291492B1 (en) The service opening method for mobile terminal with usim
US20070072641A1 (en) Methods and Apparatus for Mobile Equipment Depersonalization
CN103200558B (en) The net locking method and phone-card separated mobile terminal of a kind of phone-card separated mobile terminal
KR20180124625A (en) Method and appratus for providing roaming services
KR20090056277A (en) Method for changing mobile telecommunication service provider and method for providing specific information of mobile telecommunication service provider
KR100936605B1 (en) Method of processing subscriber identity module lock in mobile telephone
CN109088975B (en) Method and apparatus for changing mobile phone card
US20170278090A1 (en) Messaging Protocol for Secure Communication
JP6461060B2 (en) Control method and communication system
EP2958043A1 (en) Method for the recognition of user profiles
WO2006014305A1 (en) Method and radio telephone allowing accessibility of password protected functions

Legal Events

Date Code Title Description
AS Assignment

Owner name: GEMALTO S.A., FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BRADLEY, PAUL;REEL/FRAME:027650/0945

Effective date: 20120130

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20170101